A flexible workflow is described that includes a pocket of flexibility. The pocket of flexibility may include workflow fragments that may be joined together, subject to pre-defined constraints. In implementing the flexible workflow, a user may encounter the pocket of flexibility, and select from the fragments to construct a workflow that is consistent with the user's current needs. The fragments may be incrementally presented to the user on a user interface, such that only those fragments determined to be combinable in a valid way may be selected by the user. In this way, a user who may have little experience with workflow languages or terminology may be able to use the flexible workflow, and be confident that the result is valid. Thus, difficulties in dealing with change in workflow systems may be mitigated, and this mitigation may be achieved without compromising the simplicity and generic nature of a workflow language.
|
11. A method of flexible workflow management, comprising:
storing a configurable task set in a storage medium, the configurable task set including a plurality of tasks and a plurality of constraints that define relationships between the plurality of tasks, each constraint of the plurality of constraints corresponding to a constraint type of a plurality of constraint types, wherein the plurality of constraint types includes at least one structural constraint type and at least one containment constraint type;
creating a workflow process model using a process modeling tool, the process model including the configurable task set;
simplifying a specification of the plurality of constraints for each constraint, using a constraints validation engine, by resolving intra-constraint conflicts for each said constraint type to provide a minimal specification for each said constraint of the constraint type, wherein for each said constraint type, said resolving is performed by (1) examining the plurality of constraints for transitivities and redundancies, (2) where possible, capturing any transitivities and removing any redundancies detected, and (3) employing a minimum cover algorithm when the constraint type is structural and a truth table algorithm when the constraint type is containment;
resolving inter-constraint conflicts between each of the plurality of constraint types, taking into account any redundancies and/or transitivities detected between the plurality of constraint types;
validating the plurality of tasks and the plurality of constraints such that each of the plurality of tasks are includable in at least one task subset without violating any of the constraints in each of the minimal specifications of the constraints;
creating an open instance by copying the process model using a workflow engine; and
activating the configurable task set during execution of the open instance to thereby compile and execute an instance template including a selected task subset of the plurality of tasks.
1. A system for flexible workflow management, comprising:
an apparatus including a storage medium having code segments stored thereon for execution of a workflow;
a process modeling tool operable to create a workflow process model, the process model including a configurable task set that includes a plurality of tasks and a plurality of constraints that define relationships between the plurality of tasks, each constraint of the plurality of constraints corresponding to a constraint type of a plurality of constraint types, wherein the plurality of constraint types includes at least one structural constraint type and at least one containment constraint type;
a constraints validation engine operable to:
simplify a specification of the plurality of constraints for each said constraint by resolving intra-constraint conflicts for each said constraint type to provide a minimal specification for each said constraint of the constraint type, wherein for each said constraint type, said constraints validation engine is operable to resolve said intra-constraint conflicts by (1) examining the plurality of constraints for transitivities and redundancies, (2) where possible, capturing any transitivities and removing any redundancies detected, and (3) employing a minimum cover algorithm when the constraint type is structural and a truth table algorithm when the constraint type is containment;
resolve inter-constraint conflicts between each of the plurality of constraint types, taking into account any redundancies and/or transitivities detected between the plurality of constraint types;
and
validate the plurality of tasks and the plurality of constraints such that each of the plurality of tasks are includable in at least one task subset without violating any of the plurality of constraints in each of the minimal specifications of the plurality of constraints; and
a workflow engine operable to create an open instance by copying the process model, and further operable to activate the configurable task set during execution of the open instance, and to thereby compile and execute an instance template including a selected task subset of the plurality of tasks.
2. The system of
3. The system of
4. The system of
5. The system of
6. The system of
7. The system of
8. The system of
9. The system of
10. The system of
12. The method of
13. The method of
activating the configurable task set by outputting the plurality of tasks for display to a user; and
accepting the selected task subset from the user.
14. The method of
15. The method of
16. The method of
17. The method of
18. The method of
19. The method of
20. The method of
|
This application claims priority to U.S. Application Ser. No. 60/438,297, filed on Jan. 7, 2003, and titled FLEXIBLE WORKFLOW MANAGEMENT.
This description relates to workflow systems.
Conventional workflow systems exist which allow enterprises to formalize the processes by which the enterprises achieve their business objectives. Such workflow systems may provide step-by-step descriptions of tasks which must or should be performed as part of the workflow, so that individuals or groups within the enterprise can be assigned individual (or groups of) tasks. The tasks may be dependent upon one another; for example, a task may only be begun upon completion of a prior task(s), or tasks may be included in interative task loops. Additionally, the tasks may have more complex dependencies, requiring application of extensive logic rules to ensure proper completion of the workflow.
Examples of such conventional workflows can be found explicitly or implicitly in almost any enterprise. For example, a manufacturing plant may have a workflow for producing a particular type of good. As another example, an organization selling goods may have a workflow for obtaining the goods, inputting orders and/or payments for the goods, selecting a shipper for shipping the goods, and updating an inventory record based on the sale.
According to one general aspect, a task set is specified including workflow tasks, and a constraint set is specified including constraints that specify how the tasks within the task set may be implemented with respect to one another, to thereby define valid subsets of the task set, wherein the constraint set ensures that each task may be implemented in at least one valid subset. A workflow is initiated that requires at least one of the tasks, a subset of the tasks is assembled, the subset matching one of the valid subsets, and the subset is implemented within the workflow.
Implementations may include one or more of the following features. For example, in specifying the constraint set, a minimized specification of the constraint set may be determined. In this case, redundant constraints may be removed from the constraint set. Also, elements of the constraint specification may be reduced based on transitivities associated with the constraints, or a conflict between the constraints may be removed.
In the latter case, in removing the conflict, the tasks and constraints may be translated into a graph, and the graph may be traversed to determine a conflict-free constraint specification. In translating the tasks and constraints, the tasks and constraints may be translated into a directed, acyclic graph. Also in removing the conflict, truth tables may be formed, each truth table associated with one of the constraints, and the conflict may be removed based on the truth tables.
In specifying the constraint set, user input may be accepted for removing a conflict between two constraints within the constraint set, or a structural constraint may be specified that imposes a restriction on how tasks are included within the valid subsets, or a containment constraint may be specified that specifies conditions under which tasks are included within the valid subsets.
In assembling the subset of the tasks, the tasks may be output for display to a user, and input identifying a selected task may be accepted from the user for inclusion in the subset. In this case, a reduced task set may be determined, based on the selected task and the constraints, the reduced task set may be output for display to the user, and input identifying a second selected task may be accepted from the user for inclusion in the subset. Also in assembling the subset of the tasks, the subset may be validated, based on the constraints, to ensure that the subset matches one of the valid subsets.
According to another general aspect, a system includes a process modeling tool operable to create a workflow process model, the process model including a configurable task set that includes tasks and constraints that define relationships between the tasks, a constraints validation engine operable to validate the tasks and the constraints such that each of the tasks are includable in at least one task subset without violating any of the constraints, and a workflow engine operable to copy the process model to thereby create an open instance, and further operable to activate the configurable task set during execution of the open instance, and to thereby compile and execute an instance template including a selected task subset of the tasks.
Implementations may include one or more of the following features. For example, the constraints validation engine may be further operable to validate the instance template for conformance with the constraints. The workflow engine may be operable to activate the configurable task set by outputting the tasks for display to a user, and is further operable to accept the selected task subset from the user. In this case, the workflow engine may be operable to progressively accept the selected task subset from the user by outputting a revised task set for display to the user after accepting a selected task by the user, and the constraints validation engine may be operable to validate the revised task set based on the constraints.
The constraints may include a structural constraint that imposes a restriction on how tasks are included within the instance template, or a containment constraint that specifies conditions under which tasks are included within the instance template.
The constraints validation engine may be operable to provide a minimized specification of the constraints. The constraints validation engine may provide the minimized specification based on a redundancy and a transitivity associated with the constraints. The constraints validation engine also may provide the minimized specification by removing conflicts between the constraints, based on user input.
The process model may include a pre-configured workflow portion having pre-defined tasks and task relationships, in addition to the configurable task set. A worklist manager may be included that is operable to communicate with the workflow engine and thereby disseminate task information related to the instance template to workitem performers.
According to another general aspect, an apparatus includes a storage medium having instructions stored thereon. The instructions include a first code segment for initiating execution of a workflow, a second code segment for encountering a build activity within the workflow that represents a sub-goal of the workflow, the build activity including both tasks and constraints that specify how subsets of the tasks may be compiled to form a control flow for achieving the sub-goal, a third code segment for outputting the tasks for viewing by a user on a display device, a fourth code segment for accepting a selected task that is selected from the tasks by the user, a fifth code segment for determining a reduced set of the tasks based on the selected task and the constraints, a sixth code segment for outputting the reduced set for viewing by the user, a seventh code segment for accepting a second selected task that is selected by the user from the reduced set, an eighth code segment for including the selected task and the second selected task within a sub-workflow, and a ninth code segment for replacing the build activity with the sub-workflow for implementation within the workflow.
Implementations may include one or more of the following features. For example, the second code segment may include a tenth code segment for ensuring that the constraints permit each task to be included within at least one control flow.
The second code segment may include a tenth code segment for providing a minimized specification of the constraints by resolving conflicts between the constraints. In this case, the tenth code segment may accept user input to resolve the conflicts.
The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features will be apparent from the description and drawings, and from the claims.
Workflow systems related to certain processes may benefit from an increased level of flexibility of design and/or implementation. Examples of processes that may benefit from increased flexibility include processes that undergo frequent change, cannot be completely pre-defined, or simply have a large number of possible instantiations. Increased flexibility for a workflow related to one of these processes, however, should not be obtained at a cost of factors that contribute to the usefulness of the workflow system in the first place, such as, for example, its ability to be easily created, used, enforced, and/or reproduced.
One example of workflows that may benefit from increased flexibility includes healthcare workflows. In such workflows, for example, patient admission procedures are often predictable and repetitive, while, in contrast, in-patient treatments often are prescribed uniquely for each case (but nonetheless have to be coordinated and controlled). Another example includes higher education, where students with diverse learning needs and styles are working towards a common goal (degree). Study paths taken by each student need to remain flexible to a large extent, while, at the same time, study guidelines and course level constraints are necessary to ensure a certain quality of learning.
Another example may include a workflow system related to content development and management of sites on the World Wide Web (WWW), such as sites for conducting commerce. Particularly in large projects, every development may suggest a need for an overall plan to provide objectives, approvals, and strategies related to the site(s), as well as a flexible means of coordinating the combined efforts of workers including, for example, theme designers, graphic experts, programmers, and project planners. As a final example, Customer Relationship Management (CRM) systems also may benefit from flexible techniques for conducting call center activities according to available resources and data, by, for example, integrating CRM systems with core organizational workflow processes and underlying applications.
In
In the workflow 100, the various tasks together represent a “process model,” where the process model represents all particular implementations, or instances, that might result from a user running the workflow 100. In the workflow 100, for example, because of the choice task 114 and the corresponding merge task 120, there are two separate instances, or instance types, that a user may actually implement during workflow execution.
Specifically, the first instance includes all tasks except the task F 118, and the second instance includes all tasks except the task E 116. In other words, in any given execution of the process model of the workflow 100, only one of task E 116 or task F 118 will be executed. For example, in a healthcare setting, it may be that task E 116 and task F 118 represent two treatment options that are exclusive of one another, such as when two medications are contra-indicated. In this case, for any one patient (i.e., instance), only one of the two treatments (tasks) will be implemented.
Thus, a number of instance types in a given workflow process model has a direct correlation with, for example, a number of choice/merge constructs found within the process model. Although only two instance types are associated with the process model of the workflow 100 of
From the above discussion, it should be understood that one technique for quantifying a flexibility of a workflow is to determine a number of instance types that may be generated from the process model of the workflow. Another technique for quantifying workflow flexibility, as referred to above, is to consider the extent to which an instance of the workflow is predictable. Predictability may be influenced by a number of factors. For example, again in a healthcare setting, a patient may present with any number of injuries, illnesses, or conditions, some of which may not be anticipated by the healthcare provider in charge of defining the associated workflow process model. As another example, treatments associated with a particular illness may change over time, as new research and new medications become available. Again, such changes may be difficult or impossible for a designer of a process model to predict and/or incorporate into a given workflow.
Subsequently, a build activity 216, discussed in more detail below, provides multiple treatment options, each of which are constructed and enacted in a manner that is consistent with the overall workflow 200. Based on the treatment options enacted as part of the build activity 216, a diagnosis is made in a task 218, whereupon the hospital receives/processes a payment from the patient in a task 220, which leads to an end 222 of the workflow 200.
To understand the role of the build activity 216, it should be understood that many workflow enactment systems differentiate between two aspects of workflow specification referred to above, i.e., the workflow process model and the workflow execution (control) data. Specifically, the process model defines the process logic that provides the schema for particular instances of that process model. Workflow execution data, on the other hand, includes actual work items, where each work item relates to a particular execution of a task or activity. The work item thus stores all execution parameters of a particular activity, such as client assigned, relevant data, and temporal values.
In short, the process model applies to “all” instances, while the execution data applies to “one” instance. By using the build activity 216, a layer is introduced between the process model (definition) layer and the work-item (execution) data, where this layer may apply to “some” instances. As a result, for a particular instance (e.g., for a particular patient in workflow 200), an open (not fully specified) instance of the process model exists, so that the process model provides only a partial definition of the workflow itself.
Thus, a specification of a partial workflow implies a flexible workflow, which includes, in the example of
In the build activity 216, then, a control flow between the fragments 224, 226, and 228 is not completely defined in the core, or fixed, portion of the open instance (process). That is, many different possibilities for combining the fragments exist; for example, some, all, or none of the fragments may be used, and enactment of one fragment may be exclusive of, or dependent on, enactment of one or more other fragments. Rules, i.e., build constraints, exist for combining the fragments 224, 226, and/or 228, and may be implemented to ensure that selected ones of the fragments 224, 226, and 228 are combined in a valid manner.
For a particular instance (e.g., for a particular patient in the example of
If the open instance does not end after implementing a given task (310), and a build activity is encountered (312), then the build activity (e.g., the build activity 216) is activated, and its constituent workflow fragments (fragments 224, 226, and 228) are compiled in a desired manner (314). Techniques for compiling the fragments are discussed in more detail below, but it should be understood that compilation may occur subject to various build constraints for ensuring that the fragments are combined in an acceptable, valid manner.
The open instance is replaced with an instance template (316), where the instance template (also referred to simply as “template”) includes a compiled, i.e., concretized, version of the build activity, as made for a particular instance. This process repeats (308) until an end of the open instance is reached (310), whereupon the instance template is closed (318), and the process ends (320).
As can be seen from the flowchart of
Execution of the instance template takes place with full enforcement of all coordination and temporal constraints, as in a typical workflow. However, it should be understood from
In
Various techniques may be used for determining whether and how the fragments 224, 226, and 228 should be included in a given instance template. For example, the determination may be fully automated, in which case the build activity 216 may automatically build the instance template from the given set of workflow fragments, based on the instance data and build constraints. The determination may be only partially automated, in which case the build activity 216 may invoke a separate application program that allows a workflow client or user to build the instance template from the given set of workflow fragments, within a given set of build constraints. As a final example, the determination may be made manually, in which case the build activity 216 may allow a workflow client to define new fragments, and then build the instance template from the new (as well as existing) fragments.
To the extent that a workflow client is involved in either the partially-automated or manual technique, an interface may be advantageous for facilitating input from the workflow client. Such an interface may benefit from allowing the client to activate and implement the build activity 216 in an easy and intuitive manner, without requiring extensive knowledge of workflow languages, process models, or other structures specialized to workflow systems. Such easy and intuitive interfaces also may be advantageous for cases where the client is a specialist in the relevant field (e.g., healthcare or education), rather than a workflow specialist.
In
A constraints validation engine 508 is then available to be used for checking any constraints that are imposed on fragments within the pocket(s) of flexibility. That is, as discussed herein, fragments within a pocket of flexibility may have various constraints that are designed to govern possible interactions and combinations of the fragments during an instantiation of a given workflow (e.g., that certain fragments must appear in a certain order with respect to one another, or that certain fragments necessitate (or prohibit) inclusion of other fragments).
The constraints validation engine 508 acts to ensure that such constraints are optimized and consistent. For example, the constraints validation engine 508 may eliminate redundancies between the constraints. As another example, the constraints validation engine may ensure that the constraints are consistent with one another, such that every fragment is available for use in at least one instance template.
Once the process model has been verified and its constraints validated, the process model may be made available for use. In use, applications and/or users 510 initiate the copying of the process model into an open instance, using a workflow engine 512. Then, a worklist manager 514 dispenses tasks of the workflow for enacting by one or more of a group of workitem performers 516.
When the workflow engine 512 comes upon a build activity within the open instance of the workflow, it communicates with the process modeling tool 504. A pocket of flexibility builder 518 interacts with the process modeling tool 504 to perform a selection of appropriate fragments from the build activity, and this selection is verified by the process verification engine 506.
Additionally, constraints specific to the selected fragments are checked for validity by a constraints validation engine 508. That is, in addition the constraint validation performed above for ensuring a minimal level of consistency with respect to all the constraints and fragments, the constraints validation engine 508 ensures that the constraints and fragments actually selected for a particular instance template are inter-operable.
An example implementation of the workflow architecture 500 of
In
If the support person at the first level of support is capable of solving the customer's problem, then a choice task 608 allows the resolved problem to proceed immediately to a merge task 610, skipping any intermediate tasks. Then, a task 612 includes the issuing of a reply to the customer and a subsequent end 614 of the workflow. It should be understood from
If the first level of support is not capable of resolving the problem, then the choice task 608 forwards the problem, via a merge task 616, to a second level of support 618. Again, if the second level of support is capable of resolving the problem, then a choice task 620 forwards the resolved problem back to the merge task 610.
If the second level of support is not capable of resolving the problem, perhaps because the problem is a rare or new problem for which no well-defined resolution exists, then the choice task 620 forwards the problem to a configurable support pocket 622, which may contain a build activity having a number of workflow fragments that may be useful in resolving the customer problem.
The configurable support pocket 622 (i.e., fragments contained therein) is sent to the pocket of flexibility builder 518, who configures the fragments into a valid, suitable instance template. The builder 518 may interact with the configurable support pocket 622, and thereby the workitem performers 516, using the worklist manager 514 and/or using the workflow engine 512 and process modeling tool 504.
The builder 518 may be an expert user who is capable of configuring the support pocket 622. In
Specifically, the section 706 illustrates a task 708 for a support activity referred to as Support A, a task 710 for a support activity referred to as Support B, a task 712 for a support activity referred to as Support C, a task 714 for a support activity referred to as Support D, a task 716 for a support activity referred to as Support E, a task 718 for a support activity referred to as Support F, and a task 720 for a support activity referred to as Support G. Each of these tasks represents potential support tasks that may be undertaken to resolve a customer issue.
Similarly, the section 706 illustrates a task 722 for a third level of support. The section 706 further illustrates a pre-compiled set of fragments, including a fork task 724, a task for a support activity referred to as Support K, a task for a support activity referred to as Support L, and a synchronizer task 730. The pre-compiling of this set of fragments reflects a related, pre-determined constraint that may not be violated during the instantiation of the configurable support pocket 622. Specifically, in this case, the tasks 726 and 728 must be performed together (i.e., one must not be performed without the other).
As should be understood, one potential advantage of the above-described techniques is related to the ability to dynamically build instance templates, while having confidence that the built instance template is in accordance with prescribed business process constraints. These techniques not only integrate the process of change into the workflow process itself, but also allow domain experts (who would typically have a greater understanding of the business requirements) to define a process for a given business case/workflow instance, which is reflective of the particular requirements of that case. As a result, process improvements are obtainable that may not be possible or practical in generic, predefined approaches.
By allowing end users, that is, domain experts, to define the templates, an interface that may be more intuitive, friendly and/or domain specific than typical workflow modelling and editing tools may be used. To support template building, a wizards-based approach may be used, in which build options for (fragments within) build activities are progressively reduced as selections are made.
Such an interface may allow users to choose fragments and compose them incrementally. Thus, rather than having a complete verification of the built template at the end of the template-building, when it may be difficult to track constraint violations, each change operation may be followed by verification by the constraints validation engine 508, and a corresponding reconfiguration of available fragments. This will reduce (increase) available options for users in accordance with the specified constraints. In cases where a particular choice of fragments and/or composition reduces available options to one or zero, the interfacing tool may itself complete building of the remaining template.
The workflow 600 may be displayed in various ways to demonstrate its current status, such as which of the included tasks is currently active. For example, a color of the corresponding task could be changed, or the task could be highlighted or otherwise designated on the screen.
A sub-section 1008 identifies characteristics of the work item, including its name, state, and dates of availability and commencement. Another sub-section 1010 further identifies the work item, including a name, description, and properties of the work item. As can be seen, the properties information includes an identification of the configured support pocket (instance template) of section 802 of
A button 1012 allows a user of the screenshot 1000 to complete entry of information into the various fields of the screenshot 1000. A button 1014 allows the user to release the information to, for example, the workflow engine 512.
In implementing the above-described techniques, various ad-hoc modifications also may be provided. Ad-hoc modification are defined to include any unexecuted part of the instance template that may be modified at runtime. Such modifications are possible since the workflow engine 510 provides the ability to modify instance templates, even in the absence of a dedicated pocket. In such ad-hoc modifications, however, changes to the instance templates take place after instantiation. In contrast, in the case of a pocket such as the configurable support pocket 622, the change takes place on its sub-process, which has not been instantiated as yet. Thus, the use of a dedicated pocket may allow greater control over allowable changes at runtime.
In the above discussion, the components to build a pocket of flexibility (or process) are fragments and constraints. A core template also may be used, where such a core template represents a pre-defined part of the pocket (process). In this case, the given fragments and constraints may be used to build upon the core template, rather than an empty space.
In
The following discussion further explains and describes the above-recited features. For example, with respect to the flowchart 300 of
More particularly, with respect to the design of the process model (304), the below discussion describes techniques for selecting and using constraints. For example, constraints may be selected, perhaps with the aid of user input, so as to minimize redundancy and eliminate conflicts between the constraints. As part of the process model, these techniques apply in some sense to any (potential) instance of the process model (e.g., combination of fragments) that is (or may be) ultimately created. That is, these techniques ensure that every fragment may be used in at least one valid combination of fragments.
With respect to the compilation of the fragments (314), techniques are discussed for minimizing conflicts or inconsistencies between the fragments (or set(s) of fragments) for any particular instance. That is, such techniques may be dependent upon (previous) fragment selections made by a user of the workflow model. As described herein, such selections may be made by the user on a user interface that provides a progressive series of choices for selecting the workflow fragment(s), in which future selections are limited based on past selections. As a result, these techniques ensure that (a combination of) selected fragments can be combined with one another in a valid way.
For the purposes of both designing the process model (304) and compiling the build activities (314), a terminology is set forth below for the following discussion(s) of constraints. Specifically, in the following discussion, F represents a set of fragments, where fεF represents a fragment as a sub-process (or a single activity). Also, |F|=n represents the number of fragments in F, while Fm⊂F where m=1, 2, . . . . Further, C is a set of constraints, where ConstraintType (C) represents the constraint type of C.
W represents a workflow graph representing the core template, and P represents a pocket (process) given as P=<W, F, C>, where W and/or C may be empty. T is a workflow representing the target template that is intended to be dynamically built for a given P. Additionally, there may be a mapping from P→T, where one pocket may map to several templates. In this case, in order for T to be a valid template, all constraints c1, c2, . . . cnεC as given in P=<W, F, C> must hold in T, that is c1^c2^ . . . ^cn must be true.
Using the above-described terminology,
In short, in the serial constraint of
The serial constraint of
An example of the serial constraint of
In the following discussion, the serial constraint of
The serial constraint S(Fm) of
An example of the order constraint can be seen in the way applications for admission into a university program may be processed by the admission section and the faculty section of the university. In such a case, the admission section may receive the applications, screen them for missing documents, and, in most cases, determine eligibility. In certain cases, however, a recommendation of the faculty may be required to determine academic eligibility. Such a recommendation may be requested at any stage, provided the application has been screened for missing documents by the admission section before being received by the faculty.
In the following discussion, the order constraint may be referred to as O(Fm), where Fm is a non-empty subset of F. Thus O(Fm) may be represented as O({f1, f2, . . . fn}); fiεFm for i=1, . . . n. O(Fm) provides an order on the elements of Fm. Using this terminology, the order constraint O(Fm) may be defined such that, for a given O(Fm), Fk is a subset of Fm, such that all fragments in Fk are present in T. Then ∀fi, fi+jεFk where i=1 . . . n−1 and j=1 . . . n−i, there exists a path from fi to fi+j in T. As with the serial constraint S(Fm), a choice of fragments in Fk may be user-driven.
Specifically,
Execution according to the fork constraint of
An example of the fork constraint of
In the following discussion, the fork constraint may be referred to as F(Fm) where Fm is a non-empty subset of F. Thus F(Fm) may be represented as F({f1, f2, . . . fn}); fiεFm for i=1, . . . n. Using this terminology, the Fork constraint F(Fm) may be defined such that, for a given F(Fm), Fk is a subset of Fm, such that all fragments in Fk are present in T. Then ∀fi, fjεFk, there does not exist a path between them in T. As with the serial and order constraints discussed above, a choice of fragments in Fk may be user-driven.
The constraints discussed above may be considered “structural” constraints, in that they refer to how a given set of fragments may be composed within a template. A second type of constraint may be considered to be “containment” constraints, which refer to whether a particular fragment(s) may be included (contained) within a template.
In
An example of the inclusion type of containment constraint exists in travel booking, where a customer making a booking for both flight and accommodation will be provided by free transport from/to the airport. That is, inclusion of the “flight booking” fragment and the “accommodation” fragment necessitates inclusion of the “transport” fragment.
In the following discussion, the inclusion constraint may be referred to as I(Fp, Fm) where Fp and Fm are two non-empty subsets of F. Thus I(Fp, Fm) may be represented as I({fl, . . . fq}, {fl . . . fn}); fiεFp for i=1, . . . q; fjεFm for j=1, . . . n. Using this terminology, at least two cases may occur. Specifically, if all fragments from Fp are present in T then all fragments from Fm must appear in T; conversely, if not all the fragments from Fp are present in T then no rule is enforced on Fm.
More specifically, the exclusion constraint acts to identify a dependency between the sets 1302 and 1304 of fragments, such that a selection of one (or more) fragment(s) (here, the fragment A 1308 and the fragment E 1316) prohibits selection of another fragment(s) (here, the fragment F 1318) for inclusion in the resulting set (i.e., template) 1402. In
An example of the exclusion constraint may be seen in company travel reimbursements. For example, such reimbursements may be made in at least two ways: by check or by direct deposit. In a particular instance, inclusion of one should exclude the other, so that the reimbursement recipient is not paid twice for the same expense.
In the following discussion, the exclusion constraint may be referred to as E(Fp, Fm) where Fp and Fm are two non-empty subsets of F. Thus E(Fp, Fm) may be represented as E({fl, . . . fq}, {fl . . . fn}); fiεFp for i=1, . . . q; fjεFm for j=1, . . . n. Using this terminology (and similarly to the inclusion constraint), at least two cases may occur. Specifically, if all fragments from Fp are present in T, then all fragments from Fm must not appear in T. Conversely, if not all the fragments from Fp are present in T, then no rule is enforced on Fm.
In addition to the five constraints (i.e., serial, order, fork, inclusion, exclusion) introduced and defined above, many other constraint type variations also may be used. For example, although the serial and order constraints, as defined above, do not require consecutive placement, an additional (or alternative) constraint might include such a requirement. Similarly, the fork constraint does not require parallel execution, yet an additional (or alternative) constraint might include such a requirement.
Moreover, entirely different types of constraints may be used, in addition to (or instead of) the various constraint types discussed above. For example, “minimum/maximum” constraints may be used to impose a restriction on how many fragments must be included in a template. For example, if F(Fm) is given and |Fm|=n, then any k≦n fragments may be included. However, it may be necessary to more precisely specify the parameter k for certain processes.
A constraint type to capture such a restriction may be defines as a max constraint, defined as X (Fm, k), where at most k elements from Fm must be included. Somewhat similarly, a min constraint may be defined as N (Fm, k), where at least k elements from Fm must be included.
Another example of a constraint is a “multiple” constraint, designed to deal with workflows having multiple iterations and/or executions. For example, workflow graphs may contain “arbitrary cycles,” in which a sub process may be encapsulated in a typical do-while/repeat-until construct, with a given condition for iteration. As another example, “multiple executions” may refer to a situation in which a sub process may be required to be concurrently executed any k number of times, for example to fulfill the constraint “Perform a fragment k number of times,” where k is instance-dependent.
In cases where the allowable number of multiple executions of an activity (sub-process) is known, the activity may be represented multiple times in the fragment set, but with unique identification parameters. For example, if a document can be reviewed up to 3 times, then a fragment set may be given as F={f1, f2, . . . Review1, Review2, Review3, . . . fn}, where the embedded task logic for all three of Review1, Review2, and Review3 is the same. A fork (or serial) constraint may then be defined, such as F({f1, . . . Review1, Review2, Review3, . . . }), thus allowing multiple executions of the same activity.
When the number of allowable multiple executions is unknown, a new constraint type may be introduced. Such a constraint type may be defined as M (Fm), such that ∀fi,εFm for i=1, 2, . . . n, multiple executions of fi are permissible in T.
In
In ensuring a minimal specification, conflicts between individual constraints of the constraint type “n” are resolved (1506). In other words, for example, if two order constraints (such as “A must follow B” and “B must follow A”) conflict with one another, then such conflicts are resolved. Such resolution may be gained either by way of a pre-determined criteria, and/or by way of user input as to which constraint should take precedence and/or which should be eliminated. Examples of techniques for resolving intra-constraint type conflicts, and how these techniques may be facilitated by use of transitivities and redundancies within the constraint types, are discussed in detail below.
If the constraint type “n” is not the final constraint type to be considered (1510), then a next constraint type is selected (1504) and processed accordingly. Otherwise, redundancies/transitivities between the various constraint types may be considered (1512). Subsequently, the minimal specification may be completed (1502).
It should be understood that the flowchart 1500 of
Once a minimal specification has been reached for each of the constraint types individually (i.e., a concise, intra-constraint type conflict-free specification), conflicts between the different constraint types are considered (1514). For example, a conflict between an order constraint and a fork constraint could occur, in the case where the order constraint specifies “B follows A,” while the fork constraint specifies “A forks with (e.g., is in parallel with) B.” Similarly, a conflict could occur between a fork and serial constraint, and well as between an inclusion and an exclusion constraint.
Once all intra and inter-constraint conflicts are resolved, then it may be said that every fragment within the associated pocket of flexibility may be included in at least one valid template, and the pocket of flexibility is fully specified within a (presumably otherwise) valid process model. Thus, the operations of flowchart 1500 just described (1502-1514) may be thought to exist as part of designing the process model in flowchart 300 of
Even though such a process model is considered valid and every fragment may appear in at least one valid template, these facts do not necessarily imply that a particular template, composed of various fragments, is itself valid. Therefore, a template, once compiled from various fragments as described above with respect to the flowchart 300 of
Various aspects of the flowchart 1500 of
For example, as mentioned above, part of obtaining a minimal specification for each constraint type (1502) may involve consideration of properties of transitivity within the relevant constraint type (1506). For example, the Inclusion, Exclusion and Order Constraints all have a transitivity property. This property can be seen in the Order constraint, in that O({A, B}) and O({B, C}) imply that there is an order constraint on {A, B, C} such that O({A, B, C}) can replace the first two.
Similarly for the Inclusion constraint, I({A}, {B, C}) and I({B}, {D, E}) imply that B, C, D, and E must all be present when A is present. Unlike the Order constraint, however, I({A}, {B, C, D, E}) does not imply I({B}, {D, E}), and as such cannot replace the above two inclusion constraints.
Similarly for the fork constraint, F({A, B}) and F({B, C}) does not imply F({A, C}). This is shown in
By using transitivities between constraints, where possible, a specification of constraints may be optimized by re-stating the constraint specification in a more concise manner. Similarly, and in addition to analyzing such transitivities, analyzing redundancies between constraints also may be useful in optimizing a given set of constraints, i.e., in obtaining a minimal specification for the constraint type(s) (1502).
For example, in the two order constraints O({A, B, C}) and O({A, B}) are given, O({A, B, C}) subsumes O({A, B}), making the latter constraint redundant. Table 1 below identifies examples of where potential redundancies may exist. Redundancy may exist within constraint types, or it may exist across constraint types (for example, in the case of order and serial constraints).
TABLE 1
Order
Serial
Fork
Inclusion
Exclusion
Order
✓
✓
Serial
✓
✓
Fork
✓
Inclusion
✓
Exclusion
✓
In a more formal example of redundancies between order and serial constraints, if O(Fm) and S(Fn) are given and |Fm∩Fn|>1, then there is potential redundancy in S(Fn). A trivial case is when Fn⊂Fm, in which case the entire constraint, S(Fn), is redundant. Thus the stronger constraint of Order will subsume the Serial constraint.
Similarly, within the order constraint, if O(Fm) and O(Fn) are given and |Fn∩Fm|1>1, then there is potential redundancy within these constraints. A trivial case is when Fn⊂Fm, in which case O(Fn) is redundant. Similarly, there can be redundancy between serial and fork constraints.
With regard to Inclusion and Exclusion constraints, if I(Fp, Fm) and I(Fq, Fn) are given and Fp=Fq, then there is redundancy within these constraints. Thus, I(Fp, Fm) can be changed to I(Fp, Fm∪Fn), making I(Fq, Fn) redundant. Another trivial case of redundancy also exists when Fp∩Fm≠Ø. Thus I(Fp, Fm) can be changed to I(Fp, Fm−(Fp∩Fm)) without any loss. Similarly, there can be redundancy between exclusion constraints.
Although properties such as transitivity and redundancy may be used to optimize constraints for a particular pocket of flexibility, they may not generally prevent fragments from within the pocket from being combined with one another. However, and as referred to above, where intra-constraint conflicts exist, one or more fragments within a pocket of flexibility (e.g., build activity) may be prevented from being included in any valid instance template for the build activity in question.
For example, O({A, B}) and O({B, A}) are conflicting constraints, since both can not be true simultaneously. Thus, any given template containing A and B will not be verified (although a graph containing one of A or B could be verified).
Similar comments apply to the constraints S({A, B}) and F({A, B}), since the serial constraint requires that a path be present between A and B, and the fork constraint requires that a path not be present. Nonetheless, there may be a template constructed that does not contain either A or B that may be verified in spite of the conflict. However, if an additional constraint I({A}, {B}) is included, then together the three constraints will not allow any template containing A to be built.
Table 2 identifies examples of conflicting constraint types. As shown, conflicts can arise within a constraint type (e.g., order, inclusion, exclusion) as well as between constraint types (e.g., fork/serial, fork/order, inclusion/exclusion). This result is consistent with
TABLE 2
Order
Serial
Fork
Inclusion
Exclusion
Order
✓
✓
Serial
✓
Fork
✓
✓
Inclusion
✓
✓
Exclusion
✓
✓
With respect to intra-constraint type conflicts, the order constraint type may exhibit a conflict between two order constraints if any pair of fragments is present in both, but in conflicting order. That is, given O(Fm) and O(Fn), there will be a conflict when ∃fi, fjεFm such that fi precedes fj in Fm and ∃fs, ftεFn such that fs precedes ft in Fn and fi=ft and fj=fs.
With respect to the inclusion (exclusion) constraint type, an inclusion (exclusion) constraint may exhibit a conflict when, for example, I(Fp, Fm) and I(Fq, Fn) are given, and Fp⊂Fq and Fm⊂Fn.
Discussion of the inter-conflict type constraints. i.e. how they may exist and how they may be resolved, is provided in more detail below. For example, discussion is provided regarding serial/fork conflicts, order/fork conflicts, and inclusion/exclusion conflicts, and how these conflicts may be resolved with user input.
Using the descriptions above of techniques for understanding and identifying transitivities and redundancies (1504, 1512), and for understanding and identifying intra-constraint type conflicts (1508), the following describes how these concepts may be used to arrive at a minimal specification for a given pocket of flexibility.
Specifically, for example, due to transitivity and redundancy which may exist in constraints, it may not be possible to identify conflicts from an original constraint specification. For example, given a set of order constraints: O1({A, B, C}), O2({A, C, D, G}) and O3({A, G, B}), there is potential redundancy since |{A, B, C}∩{A, C, D, G}|>1. There also is transitivity in constraints O1 and O2, since A must precede B, and B must precede C according to O1, and, in turn, C must precede D (and D must precede G) according to O2, indicating an ordering constraint on {A, B, C, D, G}.
Moreover, {A, B, C, D, G} and {A, G, B} are in conflict, due to the conflicting orders of the parameters B and G. A resolution of this conflict may rest on the user, since the ordering represents a semantic dependency between B and G. Nonetheless, an identification of this conflict by the system may be necessary to alert the user to the issue (for a corresponding correction) in the first place.
In short, although small sets of constraints and fragment pairs may easily permit identification of intra-constraint type conflicts, the presence of transitivity and redundancy in larger constraint/fragment sets may make conflicts between order constraints difficult to detect. This potential difficulty leads to the minimal specification techniques referred to above with respect to
Specifically, using transitivity and eliminating redundancies, along with constraint-type specific techniques as described below, a minimal, conflict-free constraint set may be specified. In the context of
Beginning with the order constraint type,
An example of a set of order constraints might be: C(O)={O({A, B, C}), O({A, K, J}), O({A, C, J}), O({A, B, F, G}), O({F, H, I}), O({C, D, E}), and O({B, F, H})}. These seven order constraints within the set C(O) may be represented as the directed graph OG 1700, which may be used in generating a minimal specification for the set of order constraints C(O), as described above with respect to
By way of definition, a graph is considered to be a set of items connected by edges, where each item is called a vertex or node, and an edge is a connection between two vertices. In a directed graph, an edge goes from one vertex, the source, to another, the target, and thus makes a connection in only one direction. Thus, the set of order constraints C(O) may be represented by representing fragments as nodes and specifying edges therebetween.
For example, in the directed graph OG 1700, a vertex or node A 1702 is connected to a node B 1704 which is connected to a node C 1706, which is connected to a node D 1708, which is connected to a node E 1710. The node B 1704 also is connected to a node F 1712, which is connected to a node G 1714. The node F 1712 also is connected to a node H 1716, which is connected to a node I 1718. The node C also is connected to a node J 1720, while the node A 1702 also is connected to a node K 1722.
The OG 1700 can be seen to be a directed graph as defined above, since all nodes are connected by an edge going from one (source) node to another (target) node. Moreover, the OG 1700 can be seen to be acyclic, since no path (i.e., list of nodes, each having an edge from it to the next node) forms a cycle (i.e., no path starts and ends at the same node).
Based on the above definitions, a cycle in the OG 1700 represents a conflict within the set of ordering constraints C(O), since, for example, such a cycle may represent a closed loop of fragments that cannot validly be included within a pocket of flexibility. As described below, a directed acyclic graph (DAG) such as the OG 1700 represents a conflict free set of order constraints, and further, may be used to determine C(O)min, which is defined as a minimal specification for C(O). That is, in C(O)min, all transitivity has been captured and redundancies eliminated, resulting in a more concise specification for the same set of order constraints.
Thus, a minimum cover C(O)min is the set C(O) having the smallest number of elements (order constraints), so that a plurality of minimum covers may exist for a given set of order constraints C(O). The minimal cover C(O)min is used in the constraint validation procedure that is described above with respect to
In finding a minimum cover for a given set of order constraints C(O), redundant order constraints are eliminated and transitivities are removed (1802); in particular, trivial or obvious redundant order constraints and transitivities are removed. For example, an order constraint that is subsumed within another order constraint(s), as described above with respect to
Then, the set C(O) is mapped onto a directed graph OG, such as the OG 1700 (1804). As seen with the OG 1700, a set of nodes for OG is given by the union of all subsets contained in FOrder, that is F1∪F2∪ . . . ∪Fn. Thus, each node represents a fragment, and an edge between any two nodes fi and fj is defined if fi and fj are elements of the same subset Fn, that is, an order constraint O(Fn) exists in C(O).
Superfluous edges between two nodes are then removed (1806), where such superfluous edges exist when there exists another path in the same direction, between the same two nodes. This eliminates any redundant specification within the order constraints that was not earlier removed.
If any conflicts exist within the directed graph OG (1808), i.e., if any cycles are observed with the directed graph OG, then these conflicts are resolved through user input (1810). For example, a user may be given the option to specify which conflicted order constraint(s) should be retained, and which should be eliminated or modified, based on underlying business logic.
Once conflicts (if any) are resolved (1810), then the resulting directed graph should (may) map to a directed acyclic graph (DAG). If this is not the case (1812), then the above-described procedures may be repeated to remove any redundancies or conflicts that may have earlier been missed.
The OG 1700 of
In the OG 1700, or a similar DAG, a minimal cover C(O)min may be determined (1814) simply by traversing the OG 1700 to find all maximal non-branching paths of the OG 1700 or other DAG, such that no two paths have an edge in common. In
In
As seen above with respect to sets of order constraints, C(S)1 and C(S)2 are considered equivalent if and only if SG1=SG2. Similar to the minimal cover defined above for order constraints, a minimum cover C(S)min for a given C(S) is defined as the smallest set C(S)i that is equivalent to C(S). Again, there may be several minimum covers, all with the same number of elements (serial constraints), but with different arguments.
As shown in
Finally, SG is traversed to determine C(S)min(1906). The determination of C(S)min from SG can be related to the problem of determining all (maximal) cliques within a graph, where a clique in a graph is a set of vertices, any two of which are adjacent.
C(S)min may thus be extracted from the SG 2000 by finding all maximal cliques within the graph 2000. Thus, C(S)min comprises {S({A, B, C, D}) and S({B, D, E})}. As already described with respect to
Finding a minimal specification for a set of fork constraints C(F) is very similar to the process just described for a set of serial constraints C(S). Specifically, a set of fork constraints C(F) may be defined on F1, F2, . . . Fn where Fi⊂F for i=1, 2, . . . n, where FFork={F1, F2, . . . Fn}. Then, a characterization of fork constraints can be made very similarly to serial constraints, except that the semantics of the two constraints are different, in that an edge in a fully connected graph FG representing C(F) represents an absence of a path between the corresponding fragments in any valid template, rather than a presence of such a path. Nonetheless, since fork and serial constraint sets have the same properties (i.e., no transitivity, no conflict, but potential redundancy), the minimal specification can be determined in a similar way.
Specifically, sets of fork constraints C(F)1 and C(F)2 are equivalent if and only if cover FG1=cover FG2. Similar to minimal cover for order and serial constraints, for a given C(F), a minimum cover C(F)min is defined as the smallest set C(F)i that is equivalent to C(F). Again, there may be several minimum covers, all with the same number of elements (fork constraints), but with different arguments.
An example procedure for finding a minimum cover C(F)min for a given C(F), is the same as for serial constraints, as it is described above with respect to
As described above with respect to
In the following discussion of containment constraints, however, techniques are described which resolve conflicts both within constraint types (e.g., within inclusion or within exclusion constraint sets) and between constraint types (e.g., between inclusion and exclusion constraint sets). As a result, conflicts may be resolved and a minimal specification may be obtained for a set of containment constraints in a convenient and expeditious manner.
In
For example, for an Inclusion constraint I({A}, {B}), a truth table 2202 of
Next, two containment constraints (and their associated truth tables) are selected for conflict analysis (2104). Specifically, a conflict is indicated if the two tables have common columns (2106) and, if so, if the two tables have a different collection of rows within those common columns (2108). If so, then a conflict is determined to exist between the two constraints (2110), and may be resolved through user input (2112). If the two selected constraints represent a final set of constraint pairs (2114), then the process ends (2116). Otherwise, the next constraint pair is selected (2104).
For example, in the tables 2202 and 2204 of
In the example of
Although
Furthermore, in the process of
With respect to
Once a minimal specification has been generated, inter-constraint type conflicts may be resolved (1514). For example, types of inter-constraint type conflicts discussed above and shown in Table 2 include fork/order, fork/serial and inclusion/exclusion conflicts. As already explained, the generation of minimal specification may involve eliminating (inter-constraint type) conflicts between inclusion and exclusion constraints, or conflicts between inclusion and exclusion constraints may be resolved separately from intra-constraint type conflicts. The remaining conflicting constraints, e.g., fork/order and fork/serial, may be determined, for example, as discussed below.
Specifically, with respect to inter-conflict type constraints, a conflict exists between a fork and serial constraint if they have any 2 or more fragments in common. That is, given S(Fm) and F(Fn), there will be a conflict when |Fm∩Fn|>1. Similarly, with respect to fork and order constraints, a conflict exists between a fork and order constraint if they have any two or more fragments in common. That is, given O(Fm) and F(Fn), there will be a conflict when |Fm∩Fn|>1.
With respect to inclusion and exclusion constraints, an inter-constraint type conflict may exist inasmuch as a constraint set cannot have inclusion and exclusion constraints on the same fragment. That is, given I(Fp, Fm), E(Fq, Fn), there will be a conflict when Fp=Fq and Fm∩Fn≠Ø.
Additionally, the constraint set of: I(Fp, Fm), E(Fq, Fn), and Fq∪Fn⊂Fm or Fp∪Fm⊂Fn provides a conflict. This can be seen by considering the constraint set of: I({A}, {B, C}) and E({B}, {C}), because any template containing A will not be verified against the above constraints. That is, a conflict results from that fact that any template containing A must contain B and C, while at the same time, any template containing B must not contain C.
After identifying such conflicts, actual resolution of the conflicts may be dependent on the user. For example, of two conflicting constraints O({A, B, C}) and F({A, B, D}) are given, the inter-constraint type conflict is identified since |{A, B, C}∩{A, B, D}| is not less than two. A resolution of this conflict may result in the fork constraint being changed to F({A, D}) and F({B, D}), while the order constraint remains the same. Similarly, the order constraint may be changed to O({A, C}) and O({B, C}), with the fork constraint remaining the same. Another possible conflict resolution may involve dropping the order constraint altogether. Many such possibilities may exist for resolving a given conflict, and, as described above, a given resolution will typically be selected based on the business logic or user needs/preferences in the given situation.
Although not discussed in detail above, it should be understood that, as a result of choices made during conflict resolution, the constraint set may be changed. These changes made may need to be validated by iterating through the above procedures, eventually generating a minimal and conflict free constraint set. Thus, Cmin leads to Cvalid, where Cvalid represents the minimal and conflict-free set of constraints.
Such a minimal and conflict-free constraint set ensures that every fragment within a given pocket of flexibility may be included in at least one valid composition of the fragments (i.e., template). Nonetheless, this fact does not imply that every fragment may validly be included in any template, particularly given the objective that a relatively small set of fragments enables a relatively large number of processes. As a result, and as described above with respect to
In one implementation, a user may construct a template from a set of fragments within a pocket of flexibility, and then the constructed template may thereafter be validated. In another implementation, and as referred to above with respect to
Specifically,
In
The templates of
In the cases of
Plausible algorithms are presented below for each constraint type as corresponding code sections. These algorithms are based on the set of validated constraints Cvalid, as determined by the constraint validation procedure given in the previous section. Generally speaking, the algorithms ensure that a given constraint type is met by a given set of fragments. For example, that an order limitation specified in an Order constraint is met, and similarly for Fork, Serial, Inclusion, and Exclusion constraint sets.
For the order constraint of a set of fragments Fm, i.e., O(Fm), an algorithm to verify the order constraint may be used as demonstrated in Code Section 1:
Code Section 1
Verification of Order Constraint O (Fm)
GraphNodes: Set of Nodes in the workflow graph
OrderFrags: Set of fragments in Fm
Check: Set of Nodes
//Where the sets GraphNodes, OrderFrags, and Check have
elements of the //same type, i.e. a fragment will be a node in
the graph
//InDownPath (X, Y) returns true when a path from X to Y
can be found in the //workflow graph
//Count (S) returns the number of elements in the set S
Begin
Check := OrderFrags Intersect GraphNodes
If Check = {} then Return (“No Constraint Violation”)
For i = 1 to Count (Check) −1
If InDownPath (Check[i], Check[i+1]) <> TRUE
Then
Return-Error (“Order Constraint Violated”)
End-If
End-For
Return (“No Constraint Violation”)
End
For the serial constraint of a set of fragments Fm, i.e., S(Fm), an algorithm to verify the serial constraint may be used as demonstrated in Code Section 2:
Code Section 2
Verification of Serial Constraint S (Fm)
GraphNodes: Set of Nodes in the workflow graph
SerialFrags: Set of fragments in Fm
Check: Set of Nodes
//Where the sets GraphNodes, SerialFrags, and Check have
elements of the //same type, i.e. a fragment will be a node in
the graph
//InPath (X, Y) returns true when a path between X and Y
can be found in the //workflow graph. InPath (X, X) returns
true.
//Count (S) returns the number of elements in the set S
Begin
Check := SerialFrags Intersect GraphNodes
If Check = {} then Return (“No Constraint Violation”)
For i = 1 to Count (Check)
For j = 1 to Count (Check)
If InPath(Check[i], Check[i]) <> TRUE
Return-Error (“Serial Constraint
Violated”)
End-If
End-For
End-For
Return (“No Constraint Violation”)
End
For the fork constraint of a set of fragments Fm, i.e., F(Fm), an algorithm to verify the fork constraint may be used as demonstrated in Code Section 3:
Code Section 3
Verification of Fork Constraint F (Fm)
GraphNodes : Set of Nodes in the workflow graph
ForkFrags: Set of fragments in Fm
Check: Set of Nodes
//Where the sets GraphNodes, ForkFrags, and Check have
elements of the //same type, i.e. a fragment will be a node in
the graph
//InPath (X, Y) returns true when a path between X and Y
can be found in the //workflow graph. InPath (X, X) returns
true.
//Count (S) returns the number of elements in the set S
Begin
Check := ForkFrags Intersect GraphNodes
If Check = {} then Return (“No Constraint Violation”)
For i = 1 to Count (Check)
For j = 1 to Count (Check)
If InPath(Check[i], Check[j]) = TRUE
Return-Error (“Fork Constraint Violated”)
End-If
End-For
End-For
Return (“No Constraint Violation”)
End
For the inclusion constraint of a set of fragments Fp, Fm, i.e., I(Fp, Fm), an algorithm to verify the inclusion constraint may be used as demonstrated in Code Section 4:
Code Section 4
Verification of Inclusion Constraint I (Fp, Fm)
GraphNodes : Set of Nodes in the workflow graph
Present: Set of fragments in Fp
Include: Set of fragments in Fm
//Where the sets GraphNodes, Present, Include have
elements of the same //type, i.e. a fragment will be a node in
the graph
Begin
If Present Subset GraphNode
Then
If Include Subset GraphNodes
Then
Return (“No Constraint Violation”)
Else
Return-Error (“Inclusion Constraint Violated”)
Else
Return (“No Constraint Enforced”)
End-If
End
For the exclusion constraint of a set of fragments Fm, i.e., E(Fp, Fm), an algorithm to verify the exclusion constraint may be used as demonstrated in Code Section 5:
Code Section 5
Verification of Exclusion Constraint E (Fp, Fm)
GraphNodes: Set of Nodes in the workflow graph
Present: Set of fragments in Fp
Exclude: Set of fragments in Fm
//Where the sets GraphNodes, Present, Exclude have
elements of the same //type, i.e. a fragment will be a node in
the graph
Begin
If Present Subset GraphNode
Then
If Exclude Intersect GraphNodes = {}
Then
Return (“No Constraint Violation”)
Else
Return-Error (“Exclusion Constraint Violated”)
Else
Return (“No Constraint Enforced”)
End-If
End
Once a template has been verified, the concretized fragments from within the pocket of flexibility may be released for use. The template may be used once, or may be saved for future use. In this way, users may have access to a large number of templates, while still being assured of the validity of all of the templates.
As described above, a flexible workflow may be provided by designing a process model that includes one or more pockets of flexibility. The process model also may include various pre-defined tasks having pre-defined relations therebetween (i.e., a core of the process model), in addition to the pocket(s) of flexibility. The pocket of flexibility may include workflow fragments that may be joined together into multiple instances of sub-workflows or (instance) templates, subject to various pre-defined constraints. The pocket of flexibility also may include a set of pre-defined tasks having pre-defined relations therebetween (i.e., a core template of the pocket of flexibility).
In implementing the process model, a user may encounter a pocket of flexibility, and may select from, for example, the various fragments, so as to construct an instance template that is consistent with the user's current needs. The fragments may be incrementally presented to the user on a user interface, perhaps based on (previous) user selections, such that only those fragments determined to be combinable in a valid way may be selected by the user.
In this way, a user who may have little or no experience with, for example, workflow languages or terminology, may easily be able to construct a needed instance template, and be confident that the template is valid for distribution and implementation by workflow performers. As a result, difficulties in dealing with change in workflow systems, which has been a factor in limiting deployment of workflow technology in some settings, may be mitigated. Moreover, this mitigation may be achieved without compromising the simplicity and genericity of a workflow specification language.
A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made. Accordingly, other implementations are within the scope of the following claims.
Sadiq, Shazia, Sadiq, Wasim, Orlowska, Maria E.
Patent | Priority | Assignee | Title |
10053736, | Oct 18 2013 | SEVEN BRIDGES GENOMICS INC | Methods and systems for identifying disease-induced mutations |
10055539, | Oct 21 2013 | Seven Bridges Genomics Inc. | Systems and methods for using paired-end data in directed acyclic structure |
10078724, | Oct 18 2013 | SEVEN BRIDGES GENOMICS INC | Methods and systems for genotyping genetic samples |
10095758, | Sep 06 2013 | SAP SE | SQL extended with transient fields for calculation expressions in enhanced data models |
10133996, | Apr 22 2014 | International Business Machines Corporation | Object lifecycle analysis tool |
10133997, | Apr 22 2014 | International Business Machines Corporation | Object lifecycle analysis tool |
10192026, | Mar 05 2015 | SEVEN BRIDGES GENOMICS INC | Systems and methods for genomic pattern analysis |
10204207, | Oct 21 2013 | Seven Bridges Genomics Inc. | Systems and methods for transcriptome analysis |
10262102, | Feb 24 2016 | SEVEN BRIDGES GENOMICS INC | Systems and methods for genotyping with graph reference |
10319465, | Nov 16 2016 | SEVEN BRIDGES GENOMICS INC, | Systems and methods for aligning sequences to graph references |
10325675, | Aug 21 2013 | Seven Bridges Genomics Inc. | Methods and systems for detecting sequence variants |
10545792, | Sep 12 2016 | Seven Bridges Genomics Inc. | Hashing data-processing steps in workflow environments |
10584380, | Sep 01 2015 | Seven Bridges Genomics Inc. | Systems and methods for mitochondrial analysis |
10672156, | Aug 19 2016 | SEVEN BRIDGES GENOMICS INC | Systems and methods for processing computational workflows |
10678613, | Oct 31 2017 | Seven Bridges Genomics Inc. | System and method for dynamic control of workflow execution |
10724110, | Sep 01 2015 | Seven Bridges Genomics Inc. | Systems and methods for analyzing viral nucleic acids |
10726110, | Mar 01 2017 | SEVEN BRIDGES GENOMICS, INC. | Watermarking for data security in bioinformatic sequence analysis |
10790044, | May 19 2016 | SEVEN BRIDGES GENOMICS INC | Systems and methods for sequence encoding, storage, and compression |
10793895, | Aug 24 2015 | Seven Bridges Genomics Inc. | Systems and methods for epigenetic analysis |
10832797, | Oct 18 2013 | SEVEN BRIDGES GENOMICS INC | Method and system for quantifying sequence alignment |
10867693, | Jan 10 2014 | SEVEN BRIDGES GENOMICS INC | Systems and methods for use of known alleles in read mapping |
10878938, | Feb 11 2014 | Seven Bridges Genomics Inc. | Systems and methods for analyzing sequence data |
10909503, | Nov 08 2016 | EMC IP HOLDING COMPANY LLC | Snapshots to train prediction models and improve workflow execution |
10956413, | Oct 31 2018 | Salesforce.com, Inc.; SALESFORCE COM, INC | Action set translation |
11049587, | Oct 18 2013 | SEVEN BRIDGES GENOMICS INC | Methods and systems for aligning sequences in the presence of repeating elements |
11055135, | Jun 02 2017 | SEVEN BRIDGES GENOMICS, INC | Systems and methods for scheduling jobs from computational workflows |
11062793, | Nov 16 2016 | Seven Bridges Genomics Inc. | Systems and methods for aligning sequences to graph references |
11211146, | Sep 03 2013 | Seven Bridges Genomics Inc. | Methods and systems for aligning sequences |
11250931, | Sep 01 2016 | SEVEN BRIDGES GENOMICS INC | Systems and methods for detecting recombination |
11289177, | Aug 08 2016 | SEVEN BRIDGES GENOMICS, INC. | Computer method and system of identifying genomic mutations using graph-based local assembly |
11347704, | Oct 16 2015 | SEVEN BRIDGES GENOMICS INC | Biological graph or sequence serialization |
11347844, | Mar 01 2017 | SEVEN BRIDGES GENOMICS, INC. | Data security in bioinformatic sequence analysis |
11348019, | Aug 06 2020 | Cisco Technology, Inc. | Advanced workflow based self-serve automation system |
11447828, | Oct 18 2013 | Seven Bridges Genomics Inc. | Methods and systems for detecting sequence variants |
11451448, | Jun 09 2021 | Bank of America Corporation | System for cognitive technical architecture integration |
11488688, | Aug 21 2013 | Seven Bridges Genomics Inc. | Methods and systems for detecting sequence variants |
11560598, | Jan 13 2016 | Seven Bridges Genomics Inc. | Systems and methods for analyzing circulating tumor DNA |
11649495, | Sep 01 2015 | Seven Bridges Genomics Inc. | Systems and methods for mitochondrial analysis |
11697835, | Aug 24 2015 | Seven Bridges Genomics Inc. | Systems and methods for epigenetic analysis |
11702708, | Sep 01 2015 | Seven Bridges Genomics Inc. | Systems and methods for analyzing viral nucleic acids |
11756652, | Feb 11 2014 | Seven Bridges Genomics Inc. | Systems and methods for analyzing sequence data |
11810648, | Jan 07 2016 | Seven Bridges Genomics Inc. | Systems and methods for adaptive local alignment for graph genomes |
11837328, | Aug 21 2013 | Seven Bridges Genomics Inc. | Methods and systems for detecting sequence variants |
8719826, | Dec 21 2007 | SAP SE | Work flow model processing with weak dependencies that allows runtime insertion of additional tasks |
9176801, | Sep 06 2013 | SAP SE | Advanced data models containing declarative and programmatic constraints |
9354948, | Sep 06 2013 | SAP SE | Data models containing host language embedded constraints |
9361407, | Sep 06 2013 | SAP SE | SQL extended with transient fields for calculation expressions in enhanced data models |
9430523, | Sep 06 2013 | SAP SE | Entity-relationship model extensions using annotations |
9442977, | Sep 06 2013 | SAP SE | Database language extended to accommodate entity-relationship models |
9575819, | Sep 06 2013 | SAP SE | Local buffers for event handlers |
9619552, | Sep 06 2013 | SAP SE | Core data services extensibility for entity-relationship models |
9639572, | Sep 06 2013 | SAP SE | SQL enhancements simplifying database querying |
Patent | Priority | Assignee | Title |
5734837, | Jan 14 1994 | ACTION TECHNOLOGIES, INC | Method and apparatus for building business process applications in terms of its workflows |
5937388, | Dec 05 1996 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | System and method for performing scalable distribution of process flow activities in a distributed workflow management system |
5999911, | Jun 02 1995 | Mentor Graphics Corporation | Method and system for managing workflow |
6041306, | Dec 05 1996 | GOOGLE LLC | System and method for performing flexible workflow process execution in a distributed workflow management system |
6081268, | Sep 03 1997 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method for ignoring redundant constraints in a graphic editor |
7184967, | Mar 06 2001 | Microsoft Technology Licensing, LLC | System and method utilizing a graphical user interface of a business process workflow scheduling program |
20030204429, | |||
20030225607, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 29 2003 | SAP Aktiengesellschaft | (assignment on the face of the patent) | / | |||
Jan 06 2004 | SADIQ, SHAZIA | SAP Aktiengesellschaft | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014326 | /0034 | |
Jan 06 2004 | SADIQ, WASIM | SAP Aktiengesellschaft | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014326 | /0034 | |
Jan 16 2004 | ORLOWSKA, MARIA E | SAP Aktiengesellschaft | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014326 | /0034 | |
Jul 07 2014 | SAP AG | SAP SE | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 033625 | /0334 |
Date | Maintenance Fee Events |
Mar 29 2011 | ASPN: Payor Number Assigned. |
Jul 28 2014 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jul 31 2018 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Aug 03 2022 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Feb 08 2014 | 4 years fee payment window open |
Aug 08 2014 | 6 months grace period start (w surcharge) |
Feb 08 2015 | patent expiry (for year 4) |
Feb 08 2017 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 08 2018 | 8 years fee payment window open |
Aug 08 2018 | 6 months grace period start (w surcharge) |
Feb 08 2019 | patent expiry (for year 8) |
Feb 08 2021 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 08 2022 | 12 years fee payment window open |
Aug 08 2022 | 6 months grace period start (w surcharge) |
Feb 08 2023 | patent expiry (for year 12) |
Feb 08 2025 | 2 years to revive unintentionally abandoned end. (for year 12) |